Sciweavers

996 search results - page 199 / 200
» Component-based Face Detection
Sort
View
DEDS
2002
119views more  DEDS 2002»
13 years 5 months ago
Diagnosing Discrete-Event Systems: Extending the "Diagnoser Approach" to Deal with Telecommunication Networks
Abstract. Detection and isolation of failures in large and complex systems such as telecommunication networks are crucial and challenging tasks. The problem considered here is that...
Laurence Rozé, Marie-Odile Cordier
TCSV
2008
125views more  TCSV 2008»
13 years 4 months ago
Exploring Co-Occurence Between Speech and Body Movement for Audio-Guided Video Localization
This paper presents a bottom-up approach that combines audio and video to simultaneously locate individual speakers in the video (2-D source localization) and segment their speech ...
H. Vajaria, S. Sarkar, R. Kasturi
NA
2010
85views more  NA 2010»
13 years 3 months ago
The reliability/cost trade-off for a class of ODE solvers
In the numerical solution of ODEs, it is now possible to develop efficient techniques that will deliver approximate solutions that are piecewise polynomials. The resulting methods...
Wayne H. Enright, Li Yan
VIROLOGY
2010
179views more  VIROLOGY 2010»
13 years 3 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
ACSAC
2010
IEEE
13 years 3 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu